[PDF][PDF] A Credit-based Method to Selfish Node Detection in Mobile Ad-hoc Network.

S Nobahary, S Babaie - Appl. Comput. Syst., 2018 - intapi.sciendo.com
Ad-hoc networks are a set of mobile nodes that are connected via a wireless channel. Some
of the nodes in this network behave selfishly and do not send data to other nodes so that in …

A honeypot scheme to detect selfish vehicles in vehicular ad-hoc network

P Patel, R Jhaveri - … and Network Sustainability: Proceedings of IRSCNS …, 2017 - Springer
Vehicular ad hoc network (VANET) has been emerged as a prominent technology for
intelligent transportation systems. A VANET consists of a number of vehicles equipped …

Pine: Post-quantum based incentive technique for non-cooperating nodes in internet of everything

A Balaji, SK Dhurandher, I Woungang - Sensors, 2022 - mdpi.com
The Internet of Everything (IoE) is a smart system that interconnects smart entities by
incorporating low-cost or low-energy gadgets that are useful for communication with people …

[PDF][PDF] A novel approach for malicious node detection in cluster-head gateway switching routing in mobile ad hoc networks

M Gupta, P Garg, S Gupta, R Joon - International Journal of Future …, 2020 - researchgate.net
Ad hoc network is a group of wireless networks that permits communicating directly with
another node without a router. Every node imparts inside a scope of wireless transmission …

Exploring Manet Security Aspects: Analysis of Attacks and Node Misbehaviour Issues

BUI Khan, F Anwar, FDBA Rahman… - Malaysian Journal of …, 2022 - ijie.um.edu.my
Mobile ad hoc networks are susceptible to various security threats due to their open media
nature and mobility, making them a top priority for security measures. This paper provides an …

Security transition roadmap to 4G and future generations wireless networks

M Al-Humaigani, DB Dunn… - 2009 41st Southeastern …, 2009 - ieeexplore.ieee.org
Security is of utmost importance in 4G and future generations wireless networks, and
therefore the key success factor for commercial exploitation. This research is an attempt to …

Trust-based Model to Alleviate Selfish Node Attacks in MANETs

MD Priya - CVR Journal of Science and Technology, 2022 - cvr.ac.in
MANETs are dynamic in nature. So, they are subject to several attacks. It is always essential
to ensure confidentiality, availability, authenticity and reliability of the network. Conserving …

Various schemes to detect selfishness in wireless ad-hoc networks: A survey

PP Patel, RH Jhaveri - … on Green Computing and Internet of …, 2015 - ieeexplore.ieee.org
An ad hoc network is a suburbanized types of wireless network. The ad hoc which means
“for this purpose” formed network instantly when nodes are connected in network for …

[图书][B] Mitigate denial of service attacks in mobile ad-hoc networks

A Alsumayt - 2017 - search.proquest.com
Wireless networks are proven to be more acceptable by users compared with wired
networks for many reasons, namely the ease of setup, reduction in running cost, and ease of …

[PDF][PDF] International Journal of Trend in Scientific Research and Development (IJTSRD)

N Sneha, N Sneha, T Santosh, CR Manjunath - 2019 - academia.edu
It is recommended to trust SVD, a trust decomposition technique to provide advice. Tru SVD
is integrated into the recommendation model t reduce data sparsity and cold start issues and …